Telnet Protocol

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 39 Experts worldwide ranked by ideXlab platform

L U Aiqing - One of the best experts on this subject based on the ideXlab platform.

Xia Delin - One of the best experts on this subject based on the ideXlab platform.

Metongnon Lionel - One of the best experts on this subject based on the ideXlab platform.

  • Distributed attacks detection and mitigation for the Internet of Things
    2020
    Co-Authors: Metongnon Lionel
    Abstract:

    The term Internet of Things (IoT) refers to the increasing number of devices that are connected to communication networks and are able to exchange data autonomously. The proliferation of such devices of various types (refrigerator, sensor, television, camera, etc.) with permanent access to the Internet has led to new security problems. In fact, their large number and the lack of state-of-the-art protection mechanisms have made IoT devices interesting targets of cyber-attacks. An early example was the Mirai malware that infected poorly protected IoT devices and misused them for powerful attacks against other Internet hosts. In order to understand the nature of attacks related to the Internet of Things, the thesis starts with a study of the current IoT threat landscape. To this end, we have collected and studied data from a network telescope and various honeypots for IoT-specific application Protocols. Our analysis has shown that although most attackers still target the unsecured Telnet Protocol, attempts against newer IoT Protocols can be also observed. To help network operators to discover IoT devices in their networks, we have developed a new scan algorithm tailored to resource-constrained networks. We have shown that our approach reduces the time required to scan an IPv6 network by more than 35%, while maintaining a discovery rate of more than 95%. Finally, we have developed an intrusion detection and protection system in the form of a distributed architecture that detects abnormal behaviour and limits machine-to-machine communication according to policies defined by the device owners. In particular, our solution enables to stop attacks at their sources thanks to a hierarchical organization of inter-connected middleboxes. Traditional Internet services such as web servers are also protected against attacks originating from the monitored IoT devices.Le terme "Internet des objets" (IoT) fait référence aux nombres croissants d’appareils connectés à des réseaux de communication et capables d’échanger des informations de manière autonome. La prolifération de ces appareils de divers types (réfrigérateur, capteur, télévision, caméra, etc.) ayant en prime l’accès à l’internet a entraîné de nouveaux problèmes de sécurité. En effet, vu leur grand nombre couplée à l’absence de mécanismes de protection, ces appareils connectés sont devenus la cible favorite pour les cyber-attaques. Un exemple récent est le malware Mirai qui a infecté beaucoup appareils connectés mal protégés et les a utilisés pour commettre de puissantes attaques contre d’autres hôtes sur Internet. Afin de comprendre la nature des attaques liées à l’internet des objets, nous avons commencé notre thèse par une étude des menaces actuelles liées aux appareils connectés. Nous avons à cette fin recueilli et étudié les données d’un télescope rśeau couplé à divers honeypots utilisant des Protocoles applications spécifiques aux IoT. Notre analyse a montré que malgré que les attaquants ciblent encore en majorité le Protocole non sécurisé Telnet, des tentatives contre les nouveaux Protocoles de l’IoT sont tout de même présentes. Dans le but d’aider les opérateurs de réseau à découvrir les appareils connectés dans leurs réseaux, nous avons ensuite mis au point un nouvel algorithme d’analyse adapté aux réseaux à ressources limitées. Nous avons montré que notre approche réduit de plus de 35% le temps nécessaire pour l’analyse d’un réseau IPv6, tout en maintenant un taux de découverte de plus de 95% des appareils présents. Enfin, nous avons développé un système de détection et de protection contre les intrusions sous la forme d’architecture distribuée de middleboxes qui détecte les comportements anormaux et qui limite les communications de machine à machine selon des politiques prédéfinies par les propriétaires d’appareils connectés. Notre solution permet notamment de stopper les attaques depuis leurs sources grâce à une organisation hiérarchique de middleboxes. Notre système permet également de protéger les services Internet traditionnels, tels que les serveurs web contre les attaques provenant des appareils connectés surveillés.(FSA - Sciences de l'ingénieur) -- UCL, 202

  • Prevalence of IoT Protocols in Telescope and Honeypot Measurements
    'River Publishers', 2019
    Co-Authors: Metongnon Lionel, Sadre Ramin
    Abstract:

    With the arrival of the Internet of Things (IoT), more devices appear online with default credentials or lacking proper security Protocols. Consequently, we have seen a rise of powerful DDoS attacks originating from IoT devices in the last years. In most cases the devices were infected by bot malware through the Telnet Protocol. This has lead to several honeypot studies on Telnet-based attacks. However, IoT installations also involve other Protocols, for example for Machine-to-Machine communication. Those Protocols often provide by default only little security. In this paper, we present a measurement study on attacks against or based on those Protocols. To this end, we use data obtained from a /15 network telescope and three honey-pots with 15 IPv4 addresses. We find that Telnet-based malware is still widely used and that infected devices are employed not only for DDoS attacks but also for crypto-currency mining. We also see, although at a much lesser frequency, that attackers are looking for IoT-specific services using MQTT, CoAP, UPnP, and HNAP, and that they target vulnerabilities of routers and cameras with HTTP

W U Yinfang - One of the best experts on this subject based on the ideXlab platform.

Ma Kun - One of the best experts on this subject based on the ideXlab platform.